Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 22:30
Static task
static1
Behavioral task
behavioral1
Sample
2200c43b5d09f537abdc4ed2944db3d7_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2200c43b5d09f537abdc4ed2944db3d7_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
2200c43b5d09f537abdc4ed2944db3d7_JaffaCakes118.exe
-
Size
176KB
-
MD5
2200c43b5d09f537abdc4ed2944db3d7
-
SHA1
af5355f9abd4aa8599f810d855ab1ea555b2001c
-
SHA256
62c33622ba0e8b354c538c69a285fd6372d1da137da995d4c0960697df54232e
-
SHA512
f47fcbc305ea51c396dd91dcf770a25f7f40d82f1ec31256ac920a8f773a1b60b0d6a8a369624cfa7eca703eb31e01908a1a2d0033453f4c2ee6122ac622ab0c
-
SSDEEP
3072:aPKgZsYU009yEesYZfIeIXn8DBNiAHRDmm5mNWg8C6:lgZsYU009yEW7o8DOAHRDmm5msgG
Malware Config
Extracted
icedid
1604739030
aginia.net
aginia.top
aginia.in
aginia.tel
telected.com
telected.xyz
-
auth_var
1
-
url_path
/index.php
Signatures
-
IcedID Second Stage Loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1704-18-0x0000000000310000-0x0000000000315000-memory.dmp IcedidSecondLoader -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
2200c43b5d09f537abdc4ed2944db3d7_JaffaCakes118.exepid process 1704 2200c43b5d09f537abdc4ed2944db3d7_JaffaCakes118.exe 1704 2200c43b5d09f537abdc4ed2944db3d7_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1704-16-0x0000000000300000-0x0000000000301000-memory.dmpFilesize
4KB
-
memory/1704-22-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/1704-18-0x0000000000310000-0x0000000000315000-memory.dmpFilesize
20KB
-
memory/1704-17-0x000000000041A000-0x000000000041B000-memory.dmpFilesize
4KB
-
memory/1704-15-0x0000000000300000-0x0000000000301000-memory.dmpFilesize
4KB
-
memory/1704-14-0x0000000000300000-0x0000000000301000-memory.dmpFilesize
4KB
-
memory/1704-13-0x0000000000300000-0x0000000000301000-memory.dmpFilesize
4KB
-
memory/1704-12-0x0000000000300000-0x0000000000301000-memory.dmpFilesize
4KB
-
memory/1704-11-0x0000000000300000-0x0000000000301000-memory.dmpFilesize
4KB
-
memory/1704-10-0x0000000000300000-0x0000000000301000-memory.dmpFilesize
4KB
-
memory/1704-9-0x0000000000300000-0x0000000000301000-memory.dmpFilesize
4KB
-
memory/1704-8-0x0000000000300000-0x0000000000301000-memory.dmpFilesize
4KB
-
memory/1704-7-0x0000000000300000-0x0000000000301000-memory.dmpFilesize
4KB
-
memory/1704-6-0x0000000000300000-0x0000000000301000-memory.dmpFilesize
4KB
-
memory/1704-5-0x0000000000300000-0x0000000000301000-memory.dmpFilesize
4KB
-
memory/1704-4-0x0000000000300000-0x0000000000301000-memory.dmpFilesize
4KB
-
memory/1704-3-0x0000000000300000-0x0000000000301000-memory.dmpFilesize
4KB